<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 10:12:45 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cybercrime/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Hivewatchers Report for March 2026 [87 Reports]]]></title><description><![CDATA[Previous Posts, Guides, and Project Information: Hivewatchers' Posts & Guides Reporting: Reporting Form Contact Us: Discord Accepted Reports March 2026 [87 Reports] UsernameLinkAbuse Type]]></description><link>http://direct.ecency.com/hivewatchers/@hivewatchers/hivewatchers-report-for-march-2026-87-reports</link><guid isPermaLink="true">http://direct.ecency.com/hivewatchers/@hivewatchers/hivewatchers-report-for-march-2026-87-reports</guid><category><![CDATA[hivewatchers]]></category><dc:creator><![CDATA[hivewatchers]]></dc:creator><pubDate>Wed, 01 Apr 2026 14:33:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/2bP4pJr4wVimqCWjYimXJe2cnCgn8xswXgNEjXc9rZL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[❗BE AWARE OF FAKE ARBITRAGE CRYPTO SCAMS ❗[HOW THIS SCAM WORKS IS EXPLAINED]]]></title><description><![CDATA[FAKE ARBITRAGE SCAMS CONTINUE TO PERPETUATE ON TELEGRAM ❗ PLEASE BE AWARE OF ANY OFFERS FOR CRYPTO TRADING ON TELEGRAM ❗ THERE IS ONE PARTICULAR SCAMMER THAT HAS BEEN EXPLOITING HIVE ACCOUNT CREATION SERVICES]]></description><link>http://direct.ecency.com/fraud/@hivewatchers/be-aware-of-fake-arbitrage-crypto-scams-on-telegram</link><guid isPermaLink="true">http://direct.ecency.com/fraud/@hivewatchers/be-aware-of-fake-arbitrage-crypto-scams-on-telegram</guid><category><![CDATA[fraud]]></category><dc:creator><![CDATA[hivewatchers]]></dc:creator><pubDate>Mon, 30 Mar 2026 13:43:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/32FTXiZsHoAWFxzgF7aevFQV6E69FQteY5wxrfE5F2Q1tmnmjzP4T9m5zovFeadt3pTacBxDE8A41ZxKv8FrzeQfTv59UZYziCBJaShUnucKMxeAu9AykxSibcK3YzKF6BnTb79cLJofeLzi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybercriminals are Winning with AI]]></title><description><![CDATA[AI has become the most powerful tool for financial fraud since the dawn of the Internet. As predicted, criminals are exploiting it faster, more effectively, and at scale. According to the latest Interpol]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-are-winning-with-ai</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-are-winning-with-ai</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 19 Mar 2026 20:22:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5sqPYEFseghMM8yUtjmhhxakzBnCS2eeWyiTzFNbcYwRUyYG2oQdMPiYhFRQ7jMnxkVfocr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Breach Fatigue.... On the Normalisation of Cybercrime...]]></title><description><![CDATA[Ransomwere, data breeches and digital extortion have become part and parcel of daily life online... It can cost victims a fortune to clear up the mess caused by a hack - remember when hackers hit the British]]></description><link>http://direct.ecency.com/data/@revisesociology/breach-fatigue-on-the-normalisation-of-cybercrime</link><guid isPermaLink="true">http://direct.ecency.com/data/@revisesociology/breach-fatigue-on-the-normalisation-of-cybercrime</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[revisesociology]]></dc:creator><pubDate>Wed, 04 Mar 2026 20:59:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/pBMyo3B2Sao45kGEB1kRY9cJBFGQnrPp2qChGHkgVjzu1y6XFCd4yc3Z6RXqCzbfv1WQ1sQhpdGGTQyVtQT1Cy3bAHUwdznaSe7g1FhRSsYYdSKU2T4YNDQ61N6ibpnBDvSkACLo8rQV539HPCdsoJTiyvPsg4tokuWcUN9EfP6kHCvA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[🚨 UWAGA INWESTORZY! ROZBUDOWANA SIEĆ PLATFORM I PANELI – WERYFIKUJ ZANIM WPŁACISZ ŚRODKI! 🚨]]></title><description><![CDATA[🚨UWAGA INWESTORZY! ROZBUDOWANA SIEĆ PLATFORM I PANELI – WERYFIKUJ ZANIM WPŁACISZ ŚRODKI! Pierwszy zestaw domen łączy w sobie nazwy kojarzone z rozpoznawalnymi markami finansowymi oraz mniej znane projekty,]]></description><link>http://direct.ecency.com/scam/@dagmarascamalert/uwaga-inwestorzy-rozbudowana-siec-platform</link><guid isPermaLink="true">http://direct.ecency.com/scam/@dagmarascamalert/uwaga-inwestorzy-rozbudowana-siec-platform</guid><category><![CDATA[scam]]></category><dc:creator><![CDATA[dagmarascamalert]]></dc:creator><pubDate>Mon, 23 Feb 2026 10:00:36 GMT</pubDate></item><item><title><![CDATA[Cybersecurity Prediction 4: Threat Actor Lineup Shifts]]></title><description><![CDATA[In 2026 two classes of threat actors will rise in the overall impact rankings: Data Harvester and Vulnerability Researcher. AI tools will benefit them greatly in their pursuits, which will have a cascading]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-prediction-4-threat-actor-lineup-shifts</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-prediction-4-threat-actor-lineup-shifts</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 12 Jan 2026 17:50:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72LBpCFzscQ2AdQ21EBXj4vDzU3h1XMwdf3CX8YMGQ9EQ2v6GYBqTKGewFjsNrbUL68qe8ehLJb6qL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Holiday Cybercrime Surge – Top Tips to Avoid Being a Victim]]></title><description><![CDATA[As the holiday shopping frenzy kicks off with Black Friday and Cyber Monday, remember that consumers aren’t the only ones hunting for opportunities. This is the prime hunting season for cybercriminals]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/holiday-cybercrime-surge-top-tips-to-avoid-being-a-victim</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/holiday-cybercrime-surge-top-tips-to-avoid-being-a-victim</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 27 Nov 2025 08:59:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72LBpCFzscQ2AdQ21EBWYhAu6WFqA4KvZxEvpHjsL6dS5sv1EvrSb2qnuSkY3vfXJcFfUNUc3Huktn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[International Conference on Cyberlaw, Cybercrime & Cybersecurity Conference 2025]]></title><description><![CDATA[I am excited to be speaking at the International Conference on Cyberlaw, Cybercrime & Cybersecurity (ICCC 2025) on November 19th at 8pm Pacific (9:30am IST – Mumbai India time). The conference strives]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/international-conference-on-cyberlaw-cybercrime-and-cybersecurity-conference-2025</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/international-conference-on-cyberlaw-cybercrime-and-cybersecurity-conference-2025</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 20 Nov 2025 01:05:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/GTCx6Xsvc3wXZi3av7MDASYDAqZV3cVtPEXiEZxszS6oh8dk4zqU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Rise of AI-Powered Phishing - How to Spot New Attacks]]></title><description><![CDATA[In today’s digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated phishing attempt that underscores the growing threat of AI-powered]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/the-rise-of-ai-powered-phishing-how-to-spot-new-attacks</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/the-rise-of-ai-powered-phishing-how-to-spot-new-attacks</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 09 Oct 2025 21:14:15 GMT</pubDate></item><item><title><![CDATA[Cybersecurity Concerns as Blockchain Lands in Global Finance]]></title><description><![CDATA[​ The Society for Worldwide Interbank Financial Telecommunication (SWIFT) and over 30 banks servicing 200 countries, have announced they will develop a blockchain global shared digital ledger to support]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-concerns-as-blockchain-lands-in-global-finance</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-concerns-as-blockchain-lands-in-global-finance</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 03 Oct 2025 17:39:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stsAqnmSXB7pJSiMYYP3x2q8FpPkBo9m4CMhzC8KBK7zmCYpM3KMB63qQRU34sBMpTTVGNS3snC7Rdqqrmyok?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Use AI to Outpace Cyber Defenses]]></title><description><![CDATA[Is your company safe from AI attacks? I had a great conversation with David Mauro on the Cyber Crime Junkies podcast, discussing how AI can be used for both protection and malicious purposes. AI is amplifying]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/use-ai-to-outpace-cyber-defenses</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/use-ai-to-outpace-cyber-defenses</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 29 Sep 2025 18:15:15 GMT</pubDate></item><item><title><![CDATA[ Dealing with internet scammers the right way]]></title><description><![CDATA[It is no doubt the Internet has made life easier for man ever since its invention. From education to banking to communication and business and various aspects of life today, the Internet plays an all-important]]></description><link>http://direct.ecency.com/hive-168869/@corneliusoke/-dealing-with-internet-scammers-the-right-way-6az</link><guid isPermaLink="true">http://direct.ecency.com/hive-168869/@corneliusoke/-dealing-with-internet-scammers-the-right-way-6az</guid><category><![CDATA[hive-168869]]></category><dc:creator><![CDATA[corneliusoke]]></dc:creator><pubDate>Mon, 25 Aug 2025 06:40:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP35baDbn94LZJgbR43MAivbjXjJpFJ8fuCwSkLN2RPbEjG6DtZs7CnJYPVGtcJZ1z8nGEBU92Xztfw3dNrW4g3TmkjiYoPg5qdN9FL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[U.S. Takes Steps to Retain Millions in Confiscated Bitcoin Following Hacker Raid — But What Is the Actual Amount of Crypto Owned by the Government?]]></title><description><![CDATA[As the global fascination with cryptocurrencies increases, so does the involvement of governments—particularly in relation to criminal activities and the seizure of digital assets. The United States has]]></description><link>http://direct.ecency.com/hive-112018/@ruben123/us-takes-steps-to-retain-millions-in-confiscated-bitcoin-following-hacker-raid-but-what-is-the-actual-amount-of-crypto-owned-b</link><guid isPermaLink="true">http://direct.ecency.com/hive-112018/@ruben123/us-takes-steps-to-retain-millions-in-confiscated-bitcoin-following-hacker-raid-but-what-is-the-actual-amount-of-crypto-owned-b</guid><category><![CDATA[hive-112018]]></category><dc:creator><![CDATA[ruben123]]></dc:creator><pubDate>Thu, 31 Jul 2025 17:38:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/5s4dzRwnVbzGY5ssnCE4wXzkeAEXyVtgk1ApQTwHMTp6y5PvEo1yennC79381RfUEhwYu5gdT5dtjEz8Ar6A4BCiYJVbM8a7L8oeQ5vCMmkLX7wKTa8xprNH6a6KQhZ6earZQ8cCz5RC26DWGigyprLiXRM45HqZWGRJEu4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[UK Proposes Ransomware Payment Ban for Public Sector — A Step in the Right Direction]]></title><description><![CDATA[The UK government has proposed banning public sector entities — including national healthcare, education institutions, libraries, and other government bodies — from making ransomware payments. This move]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/uk-proposes-ransomware-payment-ban-for-public-sector-a-step-in-the-right-direction</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/uk-proposes-ransomware-payment-ban-for-public-sector-a-step-in-the-right-direction</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 22 Jul 2025 19:51:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NUjLpjre2J9mGbDzZVyxM68jJLUnM4vw5vgmTc5HKsKVr5ESyxbsmqTMZLjeKUHpwnE7ik4ULnRfd6pa46e8FQqVobCGSdcuPtcRFneJUmZnfYAvbZcPHfpLKk1HW4vB221uSDyk3TDUrGvZpwRY1FgtUBAPU8iBkQzA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI Slop will Fuel the Next Wave of Social Engineering Cybercrime Attacks]]></title><description><![CDATA[Simple Math: ** Rise of AI Slop** (rapid ability to generate believable content) x Cybercriminals seeking to commit fraud = Enormous Rise in Social Engineering Victimization The ease, speed, and affordability]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ai-slop-will-fuel-the-next-wave-of-social-engineering-cybercrime-attacks</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ai-slop-will-fuel-the-next-wave-of-social-engineering-cybercrime-attacks</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 01 Jul 2025 00:05:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2CwnDyeL7SRXJS3LqMtGurGjQ1jmTBipKdvgKgTKtmAKTHfmgCNThe5fs5QiYzFTPAEfb4yC3bA1kimjEoQhdvSqE5Y24vxTwWV6WEgFuh84vj7UyuvVFWACbJTZWCPZnF1jaUsc7ehUm2LFq9ShP8QNng6x2hENmGKXpMjnWgWebwNy3wo1Y?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[INTERPOL Takes Down a Infostealers Operation]]></title><description><![CDATA[Congrats to INTERPOL for taking down a major cyber information-theft infrastructure! Over 20 thousand Ips/domains were shuttered and 41 servers that contained more than 100GB of sensitive data was seized.]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/interpol-takes-down-a-infostealers-operation</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/interpol-takes-down-a-infostealers-operation</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 17 Jun 2025 20:05:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgs17AhwfjdYjmQiiEjHuNoPeo82oP443PSSvt6EKZtkZb2W5UjxzHgoTcbQma5WGQ167AREFVXSdKiMb5Ya?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[THE NUMBER ONE THREAT THAT WE ALL FACE! WITH LTC STEVE MURRAY]]></title><description><![CDATA[⇨ SUBSCRIBE HERE: bit.ly/cryptorichodysee THE NUMBER ONE THREAT THAT WE ALL FACE! WITH LTC STEVE MURRAY One Team One Fight. After May 9, 2025: - 1T1F shirts - @Ltc_steven_mur on Twitter @LTC Steven Murray]]></description><link>http://direct.ecency.com/hive-120417/@cryptorichbtc/popciain</link><guid isPermaLink="true">http://direct.ecency.com/hive-120417/@cryptorichbtc/popciain</guid><category><![CDATA[hive-120417]]></category><dc:creator><![CDATA[cryptorichbtc]]></dc:creator><pubDate>Tue, 03 Jun 2025 23:34:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/99pyU5Ga1kwr5bsMXthzYLbcngN4W2P8NtU9TWTdHC3HaQbjuuRfKKVdjVifGj8AKdHuDGpctPtMWMnQiuwSqNhcsPWk5pHu1Lzr1dBgpyCk9QWzYySNQCvDmzEJKkKiz2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[After a suspicious transfer of $333 million in Bitcoin, Monero experiences a 51% increase in its price]]></title><description><![CDATA[Moritz Kindler | Unsplash The last few hours have seen a huge boost in the price of Monero (XMR). What is even more interesting, as well as surprising, is that after a season of quiet activity, with no]]></description><link>http://direct.ecency.com/hive-167922/@vikvitnik/after-a-suspicious-transfer-of-333-million-in-bitcoin-monero-experiences-a-51-increase-in-its-price-4hy</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@vikvitnik/after-a-suspicious-transfer-of-333-million-in-bitcoin-monero-experiences-a-51-increase-in-its-price-4hy</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[vikvitnik]]></dc:creator><pubDate>Mon, 28 Apr 2025 15:43:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFkxccFCt3jiB1TPhHnzDTrodxt84i1vksuJMkdooaxTQTdXx4kbnmadh8xJc6SNfKoSqsAYiNBLGpZex92Chra5qbTNtuJDbEd9UE9EqrGMyKw4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybercrime Follows the Path of Least Resistance]]></title><description><![CDATA[We must always look at our cybersecurity defenses from the viewpoint of those attacking them! Here is a clip from my recent interview with HMG Global Viewpoint, talking about the path-of-least-resistance.]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybercrime-follows-the-path-of-least-resistance</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybercrime-follows-the-path-of-least-resistance</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 24 Apr 2025 19:32:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eHYh5B1KqaubLvYWgtN2U7396S57FEK7CUE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybercriminals Can Easily Adopt New Tech]]></title><description><![CDATA[Sandra Estok discusses how cybercriminals are not burdened by rules when it comes to leveraging new technologies. They quickly adapt new tech in pursuit of their malicious goals. Cybersecurity remains]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-can-easily-adopt-new-tech</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-can-easily-adopt-new-tech</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 11 Apr 2025 17:05:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eLKhBy2YUf7rtCBGXWzn93UPzKepDwvB4kW?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>